Resubmissions

30-09-2024 15:02

240930-selg8a1fnn 10

30-09-2024 15:02

240930-sek7fs1fnm 10

29-09-2024 10:50

240929-mw8fes1cmp 10

28-09-2024 07:48

240928-jm698avaqn 10

Analysis

  • max time kernel
    52s
  • max time network
    35s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-09-2024 10:50

General

  • Target

    k.exe

  • Size

    7.7MB

  • MD5

    a652ce5220cd49b6f763768dfa5f2a31

  • SHA1

    8b34c4ec496f910e2c70747ec73dad366a39006a

  • SHA256

    18e1937edc999cd87fa77cf26ac15b01421c4bf057ee5e0d8a659690f0db1964

  • SHA512

    62108c8f26fc7a8f3992bf3ee3957125fb806afe7dd54e5e3dce3bb58be808d1c7702c8aae0c62a90efc61777c9b0e24232166c96766765a8f70059d7b1e5b4f

  • SSDEEP

    98304:bwuFB5I0/A/636tEWlv5ZbNelTmLOqHBwiXM2Ol2GhZ:rW0/A/kIHOqKUM242WZ

Malware Config

Extracted

Path

C:\Users\Admin\Desktop\README-NOW.txt

Ransom Note
Your computer is encrypted. To recover your files you need a key. To get it, you must purchase it. You can do this by sending 300 EUR to this Monero address: 441UUX43FTv1UroSfiCAtxNJVgSDEPoGF2tqDnLMUwcn59TjGio9HH8JLjTKShj2jGVEdvSrMEBrpMrTsrnuGmSY82HYbCH Don't know how to get Monero? Here are some websites: https://changenow.io/buy/monero https://bit2me.com/buy-monero https://guardarian.com/buy-xmr (If the ransomware blocked your browser use the smartphone) Your ID: 90UxxH7CR When you purchase, contact us at [email protected]. (Specify the address with which you paid and your ID) Once you have completed all of the steps, we will contact you with the email with which you wrote to us, sending you the link to the unlocking program and your unique key. You have 3 days before the key is destroyed forever. IMPORTANT Don't try to: -Use third-party programs -Restart your PC -Change the file extension Any of these actions could corrupt your files and at that point there would be no way to recover them.
URLs

https://changenow.io/buy/monero

https://bit2me.com/buy-monero

https://guardarian.com/buy-xmr

Signatures

  • Renames multiple (2371) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Credentials from Password Stores: Windows Credential Manager 1 TTPs

    Suspicious access to Credentials History.

  • Drops startup file 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\k.exe
    "C:\Users\Admin\AppData\Local\Temp\k.exe"
    1⤵
    • Drops startup file
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:1884
    • C:\Windows\system32\cmd.exe
      cmd /c start C:\Users\Admin\Desktop\README-NOW.txt
      2⤵
      • Checks computer location settings
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:3600
      • C:\Windows\system32\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\README-NOW.txt
        3⤵
        • Suspicious use of FindShellTrayWindow
        PID:1536
  • C:\Windows\system32\NOTEPAD.EXE
    "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\README-NOW.txt
    1⤵
      PID:4784

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\Desktop\README-NOW.txt

      Filesize

      1016B

      MD5

      91fa7b60cdbdc3bf30d53bceae06c659

      SHA1

      196f5e1ba3b5ff121f19771a768bc0f0444797e3

      SHA256

      b58456f1523ad24958eac909a4d5183021ebd8b116e88c75808a7433a0d444d3

      SHA512

      8f4874b3288ffc37ddcc6f16052d5a196e45f9ba994622c3532d8c8816745baf41d953c5bea10a13f999214f34bf078f128239cf284142399a0140fc7a690671